Skip to main content

Home/ Socialism and the End of the American Dream/ Group items matching "official" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
4More

Operation Jericho Airforce Officials Sentenced to 4-8 Years | venezuelanalysis.com - 0 views

  • Eight Venezuelan military officials charged with involvement in last year’s infamous “Operation Jericho” plot against President Nicolas Maduro have been sentenced by a military court to between four and eight years in prison.   The men were amongst 30 mostly airforce officials arrested in March and April 2014 in connection with a plan to sow rebellion in the country’s armed forces and launch a coup against the current socialist administration of Nicolas Maduro. The plot is reported to have been planned throughout a two year period but was dramatically foiled by Venezuelan authorities in March 2014 following a series of tip offs from other members of the armed forces.   “The homeland is delivering justice! Military Tribunals sentence 8 officials from “Operation Jericho” for inciting rebelling and violating military decorum”, confirmed Defence Minister, Vladimir Padrino Lopez, on his Twitter account. Although Lopez did not give details on the length of the sentences handed down to the officials, according to press reports the men received between four to eight years each. 
  • The jailed officials include Andres Thomas Martinez, the great grandson of Venezuelan twentieth century military dictator, Juan Vicente Gomez, who ruled Venezuela from 1908 until his death in 1935, and former Vice-minister for Defence Education, General Oswaldo Hernández. They are all reported to have links to the United States government, as well as to prominent members of Venezuela’s rightwing opposition, including Member of Parliament for the Justice First party, Julio Borges, who was named in a confession by Hernandez.  The sentencing of the men follows the jailing of a ninth airforce official involved in the plot, Captain Acacio Moreno Mora, who was handed a prison term of 3 years and 11 months after pleading guilty on the first day of the high profile trial in February this year. 2014’s “Operation Jericho” is just one of several attempts to oust the Bolivarian government over the last 15 years, including a partially successful coup in 2002 which saw then-president, Hugo Chavez, forcefully deposed from office for 47 hours before he was returned by a popular rebellion. Earlier this year, another plot by airforce officials against the government was also discovered by Venezuelan authorities. Dubbed “the Blue Coup,” the plan included an attempt to assassinate the president, as well as the bombing of a series of “strategic” targets in the capital city using a Toucan warplane. 
  • The Blue Coup is reported to be an offshoot of last year’s Operation Jericho, with those involved having allegedly planned to release pre-recorded footage of Operacion Jericho’s General Hernandez announcing the overthrow of the Maduro government via a military uprising in order to launch the Blue Coup. Several opposition politicians such as Leopoldo Lopez, Maria Corina Machado and Antonio Ledezma have also been linked to the Blue Coup attempt. All three signed and released a “Call for a National Transition Agreement” just twenty-four hours before the Blue Coup was scheduled to take place.  The document calls on Venezuelans to back their initiative to depose the Maduro administration and install an interim de-facto government.  Both Lopez and Ledezma are currently behind bars and awaiting trial due to their alleged involvement in the opposition street violence which erupted in 2014. Ledezma in particular is being tried for his links to paramilitary groups connected to the violence. 
  •  
    Venezuelan co-conpirators of of of the several CIA coup attempts sentenced to prison.  
3More

Tap on Merkel Provides Peek at Vast Spy Net - NYTimes.com - 0 views

  • In testimony to Congress on Tuesday, the director of national intelligence, James R. Clapper Jr., gave only the roughest sketch of the size of the N.S.A.’s surveillance program, but suggested that the leader of the United States’ most powerful European ally was a single fish in a very big sea. “We’re talking about a huge enterprise here with thousands and thousands of individual requirements,” he said, using a phrase that appeared to mean individual surveillance targets. Mr. Clapper said that the United States spies on foreign leaders and other officials to see “if what they’re saying gels with what’s actually going on,” and how the policies of other countries “impact us across a whole range of issues.”
  • The N.S.A. tries to gather cellular and landline phone numbers — often obtained from American diplomats — for as many foreign officials as possible. The contents of the phone calls are stored in computer databases that can regularly be searched using keywords. “They suck up every phone number they can in Germany,” said one former intelligence official. The databases are different from those housing telephone “metadata” — information about phone numbers on each end of a call and the call’s length — to find links between terrorism suspects. “Metadata is only valuable if you are trying to track the activities of a terrorist or a spy,” said the former American intelligence official. By comparison, allied leaders are low-level priorities. In the “National Intelligence Priorities Framework,” a matrix approved by the president and updated regularly, information on members of Al Qaeda and other terrorist groups, the whereabouts of nuclear weapons in Pakistan or North Korea, or the conversations of nuclear scientists in Iran are all front-burner intelligence issues. Ranked just below them are questions about the leadership of adversaries, like Russia, China or Iran, or the state of their economies.
  •  
    "Mr. Clapper said that the United States spies on foreign leaders and other officials to see 'if what they're saying gels with what's actually going on,' and how the policies of other countries 'impact us across a whole range of issues.'" Note that none of the above has anything to do with Terrorism and very little if anything to do with national security.  Also noteworthy later in the article, "'Metadata is [sic] only valuable if you are trying to track the activities of a terrorist or a spy,' said the former American intelligence official."
4More

Palestinian Unity Government Pulls Up Stakes | nsnbc international - 0 views

  • The Palestinian unity government formed last year in a bid to heal rifts between Hamas and president Mahmoud Abbas’ Fatah party resigned on Wednesday, an official said. According to AFP, an aide to president Mahmoud Abbas said that prime minister Rami Hamdallah “handed his resignation to Abbas and Abbas ordered him to form a new government.”
  • Discussions to form a new government would include consultations with the various Palestinian factions, including Hamas, he said.
  • Officials have said the planned dissolution of the government, made up of technocrats, had been under discussion for several months because of the cabinet’s inability to operate in the Hamas-dominated Gaza Strip. Both Hamas and Islamic Jihad have condemned the unilateral dissolution of the government, a decision they say they were not consulted over. “No one told us anything about any decision to change and no one consulted with us about any change in the unity government. Fateh acted on its own in all regards,” Hamas spokesman Sami Abu Zuhri told AFP Wednesday. Khalid al-Batsh, a senior leader in Islamic Jihad, also condemned the “unilateral” move to dissolve the unity government. Before the Official resignation, a PLO Official said, “The government will continue to function until we have a new one. “I think what’s coming now is the formation of a government with politicians, not a government of technocrats.” Senior Hamas Official Ziad al-Zaza meanwhile struck a conciliatory note, calling on Abbas “to form a unity government with all national and Islamic factions to face Israeli occupation.”
  • ...1 more annotation...
  • The move comes at a critical time, with Hamas sources reporting the group is holding separate, indirect talks with Israel on ways to firm up an informal ceasefire agreement that took hold last August, ending the 50-day war in Gaza. It was not clear whether Abbas’s move to dissolve the government was linked to those talks, but the PLO official said he believed that they played a role. “If you end up having a different kind of status for Gaza, then basically the idea of a Palestinian state completely disappears,” the official said. Another high-ranking Hamas official said he believed Abbas decided to act after receiving word of the indirect contacts.
11More

As Yemen Crumbled, a Disappeared US Detainee Called Home in Fear for His Life | VICE News - 0 views

  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US."Yemen is in complete turmoil as of yesterday," she wrote on a Facebook page advocating for his release. "He was able to make a call and asked for his country, America, to save his life by rescuing him from a sectarian battle between two groups [with] which he has no involvement."Sharif Mobley, a 31-year-old father of three from New Jersey, was snatched by Yemeni security officers 5 years ago and is suspected by the US of having ties to terrorist groups after he made contract with US-born Islamist cleric Anwar al-Awlaki, who was killed in a US drone attack in Yemen in 2011. His wife, who lived with him at the time of his capture, said they had traveled to Yemen to study Arabic and the teachings of Islam.
  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US.
  • On January 20, as Houthi fighters battled the guards watching the compound of Yemen's president and further expanded their grip on the capital, a US citizen who has been detained in Sana'a since 2010 and hasn't been seen in almost a year called home to say that the Shia rebels had taken over the prison where he is held and that they planned to "kill everyone," according to his wife who resides in the US."Yemen is in complete turmoil as of yesterday," she wrote on a Facebook page advocating for his release. "He was able to make a call and asked for his country, America, to save his life by rescuing him from a sectarian battle between two groups [with] which he has no involvement."Sharif Mobley, a 31-year-old father of three from New Jersey, was snatched by Yemeni security officers 5 years ago and is suspected by the US of having ties to terrorist groups after he made contract with US-born Islamist cleric Anwar al-Awlaki, who was killed in a US drone attack in Yemen in 2011. His wife, who lived with him at the time of his capture, said they had traveled to Yemen to study Arabic and the teachings of Islam.
  • ...7 more annotations...
  • Mobley was shot in the leg during his abduction, and interrogated by FBI agents and representatives of the US Department of Defense while in hospital on January 30, 2010 — but never charged with terrorism. Instead, Yemeni authorities later charged him with the murder of a guard during a failed escape attempt, for which he now faces the death penalty. His lawyer was never formally notified of the charges against him.While his trial is ongoing, Mobley hasn't been seen in court since February 2014. In sporadic, frantic calls made from the cell phone of the occasional sympathetic guard, he has reportedly told his wife that he is being tortured and threatened. On his last call, two days before Yemen's president resigned, plunging the country into political chaos, Mobley once again told his wife that he fears for his life.
  • Mobley's lawyer, Cori Crider — the legal director of Reprieve, a UK-based legal aid group — told us that Islam is "really, really scared right now." "There is no trial process anymore, it hasn't happened for ages," said Crider, who hasn't been told where her client is and hasn't been able to speak with him in nearly a year. "[The US] really needs to renegotiate with what remains of the Yemeni state to get this guy deported and back to where he's gonna be safe, because he's really at risk right now."Crider and Islam said that US officials know where Mobley is — but that they won't tell them.
  • Mobley's whereabouts over the last year have not been confirmed — including by US officials who claimed to have visited him and found him "in good health and with  no major complaints," as reported by the Guardian. Mobley was believed to be in the hands of Yemen's Specialized Criminal Court — a secretive national security court known for its record of human rights abuse and targeting of political opponents and journalists.At some point last year, Mobley was believed to be detained at a Sana'a military base. A number of Sana'a's official facilities have recently passed under the control of Houthi rebels — including one seized Thursday, where US officials had previously trained Yemeni security forces on counter-terrorism tactics.
  • "They won't tell me and they won't tell his family," she added. "Even though they know, they refuse to tell us where their citizen is held at a time when the country is going into total chaos."Under America's Privacy Act, the state department cannot reveal any information related to a US citizen's "location, welfare, intentions, or problems" to anyone without that person's permission — this includes relatives and members of Congress.But Crider believes the US government may not only know where Sharif is, but she says they may also have had something to do with his disappearance.
  • US agents backed Mobley's initial arrest, Crider said, but they may have also been behind his subsequent disappearance. An unnamed Yemeni security source told NBC News that Mobley had been transferred in coordination with the US and that American officials have participated in his interrogation."We are very disturbed by recent reports that suggest that they are in some way implicated in the second disappearance," Crider said, adding that she has been fighting the government to disclose more information, including through government records requests. "If that's right, that's a problem of a totally different magnitude."
  • A State Department official told VICE News that there are no current plans for the US to directly evacuate Americans and that the US does not evacuate prisoners in a crisis situation, but declined to discuss Mobley's case, citing privacy laws. That's the same reasoning US officials have given to Crider — who has been fighting for months to find her client."I was like, guys, I'm this person's attorney," she said. "He has a right to see his legal representative — that is basic under Yemeni law just like it would be under US law. So you know where he is, you know he has a right to an attorney, what are you doing? Where is he?"
  • In previous calls to his wife, Mobley said that his captors had forced him to drink from bottles that had previously contained urine, and sprayed him with mace when he asked to speak with embassy officials. Lawyers with Reprieve said that during his detention he was beaten, chained to a bed, and dragged down the stairs.
  •  
    The State Department's Privacy Act excuse for withholding the location of Sharif Mobley is a load of bull puckey intended for media consumption, not as a serious legal argument. The Privacy Act has an exception for just such situations: "(b) Conditions of Disclosure.- No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains, *unless disclosure of the record would be-* ... (8) to a person pursuant to a showing of compelling circumstances affecting the health or safety of an individual if upon such disclosure notification is transmitted to the last known address of such individual;" 5 U.S.C. 552a(b), http://www.law.cornell.edu/uscode/text/5/552a. This is an outrageous cover-up!
2More

Letter Calls Plea Deal for David Petraeus a 'Profound Double Standard' - NYTimes.com - 0 views

  • The plea deal given to retired Gen. David H. Petraeus, which spares him prison time even though he gave military secrets to his mistress, reveals a “profound double standard” in the way the Obama administration treats people who leak classified information, a lawyer for an imprisoned government contractor wrote in a letter to prosecutors.
  •  
    Interesting article that explores double standards in plea bargains for low and high ranking U.S. officials who leak classified information. In the Petraeus case, I recall a statement by Diane Feinstein, who praised Petreus for excellent service to the government in the same interview, to the effect that Petraeus deserved leniency because his fall from such a high position in the government was sufficient punishment.  That's a recurring canard when a high official gets a slap on the wrist rather than prison time: [i] "falling into prison" is a much higher fall than a fall from power; [ii] a high official with greater power should be held to a higher standard of public trust than lower level officials, not a lower standard; and [iii] certainty of not doing prison time because of one's power encourages misconduct rather than deterring it. But double standards for the very  rich and the very powerful are far from a recent development and hardly unique to the U.S.  
8More

IRBIL, Iraq: Iraqi army remains on defensive as extent of June debacle becomes clearer ... - 0 views

  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • ...5 more annotations...
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • Iraqi and U.S. officials have confirmed that fighters allied with the Islamic State not only captured hundreds of U.S.-supplied Humvees and large amounts of ammunition in their march across Iraq, but they also now possess as many as 52 U.S.-supplied artillery pieces with GPS aiming systems. The 155mm guns have a range of 20 miles, putting many Iraqi cities still in government hands easily within range of Islamic State positions.
  • With five teams of 90 U.S. troops completing their initial assessment of what it would take to help the Iraqi army reverse its military losses, the situation as described by Iraqi soldiers, a senior Iraqi politician and outside analysts who are carefully watching developments underscores how difficult a task awaits any American advisers asked to rejuvenate the Iraqi military. They describe a military riddled with incompetence, unable to provide support to troops in combat, widespread cowardice among the officer corps, and without a coherent plan for reversing the Islamic State’s advance.The initial U.S. assessment, which arrived at the Pentagon Monday, apparently is just as grim. In one of its most alarming findings, according to a Pentagon official, the advisers concluded that while Iraqi troops could defend Baghdad against an attack now, they would be unable to launch the kind of offensive maneuvers required to fend off the insurgents for the long term, leaving the capital at continued risk. The official asked to remain anonymous because he had not been authorized to discuss the report.The advisers also warned that the majority of Iraqi brigades are infiltrated by either Sunni extremists or Shiite militias, the official said.
  • Four Iraqi army divisions have simply disappeared and won’t be easily resurrected.The 2nd Division was routed from Mosul, Iraq’s second largest city, on June 9 at the beginning of the Islamic State’s advance, and its four brigades have dissolved. The 1st Division also is basically gone, losing two brigades in Anbar province earlier in the year, then two more during last month’s Islamic State onslaught, including one brigade that in the words of the senior Iraqi politician was “decimated” in Diyala province northeast of Baghdad.The same is true of Iraq’s 3rd Division. The division’s 6th and 9th Brigades fled the Islamic State’s advance in the north, and the status of its 11th Brigade is unknown. A small unit of its 10th Brigade is still in Tal Afar, but it is trapped by Islamic State forces.
  • The 4th Division also was routed. Half its members have disappeared _ many suspect they were massacred when the Islamic State captured Tikrit _ and only one small unit is known to still exist, surrounded by Islamists at a one-time U.S. military base near Tikrit known as Camp Speicher.
7More

Greenwald - The Intercept - 0 views

  • Sunday morning news television is where Washington sets its media agenda for the week and, more importantly, defines its narrow range of conventional, acceptable viewpoints. It’s where the Serious People go to spout their orthodoxies and, through the illusion of “tough questioning,” disseminate DC-approved bipartisan narratives. Other than the New York Times front page, Sunday morning TV was the favorite tool of choice for Bush officials and neocon media stars to propagandize the public about Iraq; Dick Cheney’s media aide, Catherine Martin, noted in a memo that the Tim Russert-hosted Meet the Press lets Cheney “control message,” and she testified at the Lewis Libby trial that, as a result, “I suggested we put the vice president on Meet the Press, which was a tactic we often used. It’s our best format.” Over the last couple months, the Sunday morning TV shows — NBC’s Meet the Press, CBS’s Face The Nation, ABC’s This Week, Fox’s News Sunday, and CNN’s State of the Union — have focused on a deal with Iran as one of their principal topics. In doing so, they have repeatedly given a platform to fanatical anti-Iran voices, including Israeli officials such as Prime Minister Benjamin Netanyahu. They have sycophantically interviewed officials from the U.S.-supported, anti-Iranian Gulf tyrannies such as Saudi Arabia and Jordan; two weeks ago, Chuck Todd interviewed Saudi Ambassador to the U.S. Adel Al-Jubeir and didn’t utter a word about extreme Saudi repression,
  • In the last three weeks alone, Meet the Press has interviewed the Israeli prime minister, the Saudi ambassador, and the Israeli ambassador to the U.S.
  • Meanwhile, their “expert media panels” almost always feature the most extremist “pro-Israel,” anti-Iran American pundits such as Jeffrey Goldberg, who played a leading role in spreading false claims about Iraq under the guise of “reporting” (and only became more beloved and credible in DC for it), was dubbed Netanyahu’s “faithful stenographer” by New York Times columnist Roger Cohen, and even joined the Israeli military in his young adulthood. In 2014, Face the Nation interviewed Netanyahu five times and featured his “faithful stenographer,” Goldberg, three times; in 2015, the CBS show just last week interviewed Netanyahu and has already hosted Goldberg four times. ABC’s This Week with George Stephanopoulos actually features supreme neocon propagandist Bill Kristol as a regular “ABC News Contributor” and has also interviewed Netanyahu. And that’s to say nothing of the “hawkish,” AIPAC-loyal and/or evangelical members of the U.S. Congress who are fanatically devoted to Israel and appear literally almost every week on these programs. But as these shows “cover” the Iran deal, one thing is glaringly missing: Iranian voices. There has not been a single Iranian official recently interviewed by any of these Sunday morning shows. When I raised this issue on Twitter a couple of weeks ago, a Meet the Press senior editor, Shawna Thomas, said the show had “put in a request” with Iran for an interview, while MSNBC’s Chris Hayes also suggested that it can be difficult to secure interviews with Iranian government officials.
  • ...4 more annotations...
  • That may be, but even if it is difficult to obtain interviews with Iranian government officials, it is extremely easy to interview Iranian experts, scholars, journalists and other authoritative voices from Tehran. Last week, Democracy Now’s Amy Goodman and Juan Gonzalez hosted a fascinating hour-long discussion about Iran with Seyed Hossein Mousavian, a former nuclear negotiator for Iran who was Iran’s ambassador to Germany from 1990 to 1997, and now teaches at Princeton. Just this week, CNN International’s Christiane Amanpour interviewed Tehran University Professor Sadegh Zibakalam about Tehran’s views and actions in the Iran deal. Beyond those in Iran, there are Iranian-American groups and Iranian-American experts who actually speak Farsi who don’t see the world the way Jeffrey Goldberg and Lindsey Graham do. Outside the Sunday shows, Iranian officials have been interviewed occasionally by U.S. media figures. In sum, the only way to exclude Iranian voices is if you choose to exclude them. That’s exactly what Sunday morning television programs have done, and continue to do. And it matters a great deal for several reasons.
  • For one, excluding the Iranian viewpoint ensures that these shows spew propaganda to the American public. Iran is talked about, almost always in demonic terms, but is almost never heard from. That means that these shows, which endlessly boast of their own “objectivity,” are in fact far more akin to state media. My Intercept colleague Jon Schwarz this week wrote an article detailing seven historically indisputable facts about what the U.S. has done to Iran — which cause some in that country to chant “Death to America” — and it went viral. Why? Because those facts, though quite well-established, are virtually never mentioned in U.S. media accounts that depict Iran as filled with irrational, primitive, inexplicable hatred for the U.S., designed to show how unstable and blindly hateful they are. That is propaganda by definition: amplifying one side’s views (the U.S. and Israeli governments’) while suppressing others’. Then there’s the ease with which those who are rendered invisible are easily demonized. For decades, the key to depicting gay people as mentally ill predators was ensuring they were never heard from, forced to be mute in the closet; once they were out in the open and understood, that demonization became impossible.
  • This has also been the favored foreign policy dynamic in the U.S. for decades. When Americans are killed by a foreign Muslim, we are deluged with information about the American victims and their grieving families, while we hear almost nothing about the innocent victims killed by the U.S. or its allies — not even their names. This gross imbalance in coverage creates the illusion that Americans are innocent victims of terrorism but never its perpetrators. Identically, when American journalists are imprisoned by an adversary of the U.S. government, American journalists trumpet it endlessly, while foreign journalists imprisoned for years with no trial by the U.S. government are all but disappeared. Silencing The Other Side is a key U.S. media propaganda tactic. There are all sorts of dubious claims presented about Iran, the U.S. and Israel that are treated as unchallenged truth in U.S. media discourse. The range of “debate” allowed by the U.S. media — is Obama’s deal with Iran a good idea or not? — all assumes those dubious claims about Iran to be true. But those claims are vehemently disputed in large parts of the world, certainly in Tehran. But Americans, especially the millions who get their news from Sunday morning television or from outlets whose agenda is shaped by those programs, literally have no idea about any of that, because the people who can best advocate those views — i.e. Iranians — are simply never heard from.
  • It’s remarkably telling that the only voices heard on Sunday morning TV shows are those who spout the U.S. government line about Iran, including officials from the repressive regimes most closely allied with the U.S. Obviously, one can find the arguments of Iranians unpersuasive or even harbor hostility to that nation’s government, but what possible justification is there for the leading Sunday morning news shows in the U.S. to simply suppress those views altogether?
4More

Iraqi officials: US captured top ISIS chemical arms engineer | News , Middle East | THE... - 0 views

  • U.S. special forces captured the head of ISIS's unit trying to develop chemical weapons in a raid last month in northern Iraq, two senior Iraqi intelligence officials told the Associated Press, the first known major success of Washington's more aggressive policy of pursuing the jihadis on the ground. The Obama administration launched the new strategy in December, deploying a commando force to Iraq that it said would be dedicated to capturing and killing ISIS leaders in clandestine operations, as well as generating intelligence leading to more raids.
  • U.S. officials said last week that the expeditionary team had captured an ISIS leader but had refused to identify him, saying only that he had been held for two or three weeks and was being questioned. The two Iraqi officials identified the man as Sleiman Daoud al-Afari, who worked for Saddam Hussein's now-dissolved Military Industrialization Authority where he specialized in chemical and biological weapons. They said al-Afari, who is about 50 years old, heads ISIS's recently established branch for the research and development of chemical weapons.
  • Beyond intelligence value, the capture could strike a blow to what Iraqi and American officials have described as a determined effort by ISIS to develop chemical weapons. The jihadi group was believed to have set up a special unit dedicated to chemical weapons research, made up of Iraqi scientists from the Saddam-era weapons program as well as foreign experts who joined the group. Iraqi officials expressed particular worry over the campaign because ISIS gained so much room to operate and hide chemical laboratories after overrunning around a third of the country in the summer of 2014, joined with territory they controlled in neighboring Syria.
  • ...1 more annotation...
  • The group is believed to have created limited stocks of mustard gas. Iraqi officials say it has ambitions to develop more dangerous agents like nerve gas, though the U.S. has said it appears still far from that goal. Tests confirmed mustard gas was used in a town in Syria when ISIS was launching attacks there in August 2015. Other unverified reports in both Iraq and Syria accuse ISIS of using chemical agents on the battlefield.
5More

Israeli official: We underestimated Assad | JPost | Israel News - 0 views

  • The debate over the situation in Syria and President Bashar Assad's chances for survival has sharpened recently within the Israeli defense establishment. A senior defense official claimed recently in closed conversations that Israel has erred in its estimates of how quickly Assad would fall from power in Syria.According to the official, Israel has "underestimated" Assad's strength and the inner life force of the Syrian regime.
  • The opinion that the fall of Assad and the assumption of power by the rebels would be good for Israel has become less popular recently, as it has emerged that the infiltration of extremist Jihad and al-Qaida elements is deeper and wider than was originally estimated.
  • The defense official's comments came as Russian Foreign Minister Sergei Lavrov confirmed Israel's fears on Thursday, when he officially announced that Russia will indeed complete the sale of the S-300 advanced anti-aircraft missile system to Syria.
  • ...2 more annotations...
  • “Those who do not plan aggressive actions against a sovereign state have nothing to worry about, because air defense methods – and this is clear from the name – are a purely defensive system required to repel air attacks,” Lavrov said.
  • CIA director John Brennan arrived in Israel on Thursday on a surprise visit to discuss the situation in Syria, an Israeli official said.Brennan held talks soon after his arrival with Defense Minister Moshe Ya’alon in Tel Aviv, the official added.
3More

Pentagon Officials: No Actionable Intelligence From Yemen Raid - 0 views

  • The Trump Administration’s decision to continue hyping a failed Yemeni raid, despite all evidence to the contrary, as having netted a trove of intelligence continues to blow up in their face tonight, as Pentagon officials once again affirmed that the information gathered was minimal, and things they already knew about. Some equipment was recovered giving them some insight into tactics, but so far none of the laptops and cellphones seized has any useful information on it. This is in keeping with what other US officials said just two days prior, that no “actionable” intelligence was gathered in the raid, but is in direct contradiction to claims by President Trump last night at the Congressional address, and Vice President Mike Pence today, that “significant” intelligence was obtained. The first major foreign military operation on his term, President Trump has invested a lot of effort into portraying the operation as an unquestioned success. Repeated concessions from the military that there were myriad problems, and things didn’t go nearly as well as intended, have all been dismissed, with Trump continuing on with the success claims.
  • That we never really get good information on what the source of intelligence is for future raids means it’s likely impossible to ever conclusively prove no actionable intelligence came from Yemen, though the fact that the Pentagon keeps saying this is the case certainly lends credence to the idea that the operation, on top of all of its other failures, didn’t accomplish anything intelligence-wise.
  •  
    The Deep State keeps lobbing more shells at Trump.
3More

Wyden Statement at Senate Intelligence Committee's Open Hearing | Press Releases | U.S.... - 0 views

  • U.S. Senator Ron Wyden (D-Ore.) delivered the following statement prior to questioning senior Intelligence Community officials during the Senate Intelligence Committee’s open hearing. Wyden is a senior member of the Intelligence committee. “The men and women of America’s intelligence agencies are overwhelmingly dedicated professionals and they deserve to have leadership that is trusted by the American people. Unfortunately, that trust has been seriously undermined by senior officials’ reckless reliance on secret interpretations of the law and battered by years of misleading and deceptive statements that senior officials made to the American people. These statements did not protect sources and methods that were useful in fighting terror. Instead they hid bad policy choices and violations of the liberties of the American people. For example, the director of the NSA said publicly that the NSA doesn’t hold data on U.S. citizens. That was obviously untrue.  Justice Department officials testified that section 215 of the Patriot Act is analogous to grand jury subpoena authority. And that deceptive statement was made on multiple occasions. officials also suggested that the NSA doesn’t have the authority to read Americans’ emails without a warrant but the FISA court opinions declassified last August showed that wasn’t true either.
  • The statement and subsequent questions may be viewed below or here:
  •  
    Ron Wyden comes out swinging at a Senate hearing, giving 3 examples of lies about digital surveillance told to Congress by intelligence officials and DoJ. Then he presses DNI Clapper, CIA head Brennan, and FBI head Comey to provide by dates certain written public answers to a series of questions that he had previously asked in writing but never received answers on. All three said they would provide the answers, Clapper within 30 days and the other two within 7 days.  The questions themselves are extremely important, about the government's interpretation of legal authorities to conduct warrantless searches and in the case of the CIA, whether it is subject to the Computer Fraud and Abuse Act. That Act provides for criminal penalties and civil damages for accessing a "protected computer" (essentially any computer connected to the internet, whether in the U.S. or abroad) or activating any command or installing any malware on a protected computer. See generally, http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act That question suggests that Wyden and his staff are boring into issues involving the government breaking into computers to access private data. Another question asked whether the government claimed the authority to access private data stored in the cloud without a warrant.  This is a short video well worth the watching time.
2More

Bush Lets U.S. Spy on Callers Without Courts - New York Times - 0 views

  • Months after the Sept. 11 attacks, President Bush secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without the court-approved warrants ordinarily required for domestic spying, according to government officials. Under a presidential order signed in 2002, the intelligence agency has monitored the international telephone calls and international e-mail messages of hundreds, perhaps thousands, of people inside the United States without warrants over the past three years in an effort to track possible "dirty numbers" linked to Al Qaeda, the officials said. The agency, they said, still seeks warrants to monitor entirely domestic communications. The previously undisclosed decision to permit some eavesdropping inside the country without court approval was a major shift in American intelligence-gathering practices, particularly for the National Security Agency, whose mission is to spy on communications abroad. As a result, some officials familiar with the continuing operation have questioned whether the surveillance has stretched, if not crossed, constitutional limits on legal searches.
  •  
    This is the 2005 article that alerted the nation to the fact that the Bush II Administration had, shortly after 9-11-2001, authorized the NSA to conduct warrantless electronic eavesdropping on Americans. It would later emerge that veteran NSA intelligence analyst Russell Tice, the first NSA whistleblower, was a key source for the article. http://en.wikipedia.org/wiki/Russ_Tice Post-Snowden disclosures, Tice went public with even more detail, disclosing that the NSA has also wiretapped top officials in all three branches of government, as well as non-government targets in the U.S. http://www.washingtonsblog.com/2013/06/nsa-whistleblower-nsa-spying-on-and-blackmailing-high-level-government-officials-and-military-officers.html (for the quoted portions, begin listening at about 44 minutes into the podcast). The third from last paragraph in the article discusses a 2002 Justice Department brief in which DoJ argued that "the Constitution vests in the President inherent authority to conduct warrantless intelligence surveillance (electronic or otherwise) of foreign powers or their agents, and Congress cannot by statute extinguish that constitutional authority." That brief is archived at the FAS web site. https://www.fas.org/irp/agency/doj/fisa/092502sup.html (it's an amazingly arrogant document). 
28More

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
5More

Exclusive: U.S. directs agents to cover up program used to investigate Americans - chic... - 0 views

  • WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
  • The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security. It was created in 1994 to combat Latin American drug cartels and has grown from several dozen employees to several hundred. Today, much of the SOD's work is classified, and officials asked that its precise location in Virginia not be revealed. The documents reviewed by Reuters are marked "Law Enforcement Sensitive," a government categorization that is meant to keep them confidential. "Remember that the utilization of SOD cannot be revealed or discussed in any investigative function," a document presented to agents reads. The document specifically directs agents to omit the SOD's involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use "normal investigative techniques to recreate the information provided by SOD."
  • A spokesman with the Department of Justice, which oversees the DEA, declined to comment. But two senior DEA officials defended the program, and said trying to "recreate" an investigative trail is not only legal but a technique that is used almost daily.
  • ...2 more annotations...
  • A former federal agent in the northeastern United States who received such tips from SOD described the process. "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it," the agent said. "PARALLEL CONSTRUCTION" After an arrest was made, agents then pretended that their investigation began with the traffic stop, not with the SOD tip, the former agent said. The training document reviewed by Reuters refers to this process as "parallel construction." The two senior DEA officials, who spoke on behalf of the agency but only on condition of anonymity, said the process is kept secret to protect sources and investigative methods. "Parallel construction is a law enforcement technique we use every day," one official said. "It's decades old, a bedrock concept." A dozen current or former federal agents interviewed by Reuters confirmed they had used parallel construction during their careers. Most defended the practice; some said they understood why those outside law enforcement might be concerned.
  • Today, the SOD offers at least three services to federal, state and local law enforcement agents: coordinating international investigations such as the Bout case; distributing tips from overseas NSA intercepts, informants, foreign law enforcement partners and domestic wiretaps; and circulating tips from a massive database known as DICE. The DICE database contains about 1 billion records, the senior DEA officials said. The majority of the records consist of phone log and Internet data gathered legally by the DEA through subpoenas, arrests and search warrants nationwide. Records are kept for about a year and then purged, the DEA officials said. About 10,000 federal, state and local law enforcement agents have access to the DICE database, records show. They can query it to try to link otherwise disparate clues. Recently, one of the DEA officials said, DICE linked a man who tried to smuggle $100,000 over the U.S. southwest border to a major drug case on the East Coast.
3More

WASHINGTON: US looks to bypass Karzai on Afghanistan security deal, sources say | Natio... - 0 views

  • U.S. officials seeking to resolve a tense standoff with Afghan President Hamid Karzai were exploring on Tuesday whether they could bypass him and get other senior officials to sign a security deal authorizing American troops to remain in the country after 2014. A day after Karzai abruptly said he would not sign unless Washington agreed to additional conditions, the Obama administration was pushing for Foreign Minister Zarar Ahmad Osmani or another official to endorse the agreement on behalf of the government in Kabul, Afghanistan, several U.S. officials said. The Pentagon has been saying for months that it needs the security pact in place by the end of the year to give planners time to draft deployment schedules and secure funding for post-2014 operations. Without a signed agreement, U.S. officials say, they will begin planning a complete withdrawal of the remaining 47,000 American troops next year. That means Afghanistan could be left to face a still-potent Taliban insurgency without substantial foreign military assistance.
  • Susan Rice, Obama's national security advisor, told Afghanistan's Tolo television station that it was not possible for the United States to postpone signing the deal until the spring, as Karzai has called for. She brushed aside Karzai's call for the release of all Afghans held at the naval prison in Guantanamo Bay, Cuba, and other demands. "We've concluded the negotiations of the agreement," Rice said at the end of a three-day visit to Kabul. "We're getting the text ready, and we'll sign it at a high level," an apparent acknowledgment that someone other than Karzai could sign for the Afghans. But U.S. officials concede that the notion of bypassing Karzai poses enormous difficulties and is probably not a viable solution to the standoff unless Karzai himself accepts the idea. "The heads of state wouldn't have to sign the document, but they would have to delegate that authority," said a senior U.S. official in Kabul familiar with the discussions. "So I don't think it's clear here if it could be put into effect without (Karzai's) approval."
  •  
    The Obama Administration dislikes puppets who protest having a string jerked.
5More

Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views

  • (Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
  • One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
  • Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
  • ...2 more annotations...
  • Glenn Greenwald, who met with Snowden in Hong Kong and was among the first to report on the leaked documents for the Guardian newspaper, said the former NSA contractor had "taken extreme precautions to make sure many different people around the world have these archives to insure the stories will inevitably be published.""If anything happens at all to Edward Snowden, he has arranged for them to get access to the full archives," Greenwald said in a June interview with the Daily Beast website. He added: "I don't know for sure whether has more documents than the ones he has given me... I believe he does."In an email exchange with Reuters, Greenwald, who has said he remains in contact with Snowden, affirmed his statements about Snowden's "precautions" but said he had nothing to add.Officials believe that the "doomsday" cache is stored and encrypted separately from any material that Snowden has provided to media outlets.
  • Sources familiar with unpublished material Snowden downloaded said it also contains information about the CIA - possibly including personnel names - as well as other U.S. spy agencies such as the National Reconnaissance Office and National Geospatial-Intelligence Agency, which operate U.S. image-producing satellites and analyze their data.U.S. security officials have indicated in briefings they do not know what, if any, of the material is still in Snowden's personal possession. Snowden himself has been quoted as saying he took no such materials with him to Russia.
11More

Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radi... - 0 views

  • WASHINGTON -- The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document. The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation and authority. The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger. “A previous SIGINT" -- or signals intelligence, the interception of communications -- "assessment report on radicalization indicated that radicalizers appear to be particularly vulnerable in the area of authority when their private and public behaviors are not consistent,” the document argues. Among the vulnerabilities listed by the NSA that can be effectively exploited are “viewing sexually explicit material online” and “using sexually explicit persuasive language when communicating with inexperienced young girls.”
  • The Director of the National Security Agency -- described as "DIRNSA" -- is listed as the "originator" of the document. Beyond the NSA itself, the listed recipients include officials with the Departments of Justice and Commerce and the Drug Enforcement Administration. "Without discussing specific individuals, it should not be surprising that the US Government uses all of the lawful tools at our disposal to impede the efforts of valid terrorist targets who seek to harm the nation and radicalize others to violence," Shawn Turner, director of public affairs for National Intelligence, told The Huffington Post in an email Tuesday. Yet Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said these revelations give rise to serious concerns about abuse. "It's important to remember that the NSA’s surveillance activities are anything but narrowly focused -- the agency is collecting massive amounts of sensitive information about virtually everyone," he said. "Wherever you are, the NSA's databases store information about your political views, your medical history, your intimate relationships and your activities online," he added. "The NSA says this personal information won't be abused, but these documents show that the NSA probably defines 'abuse' very narrowly."
  • None of the six individuals targeted by the NSA is accused in the document of being involved in terror plots. The agency believes they all currently reside outside the United States. It identifies one of them, however, as a "U.S. person," which means he is either a U.S. citizen or a permanent resident. A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are. Stewart Baker, a one-time general counsel for the NSA and a top Homeland Security official in the Bush administration, said that the idea of using potentially embarrassing information to undermine targets is a sound one. "If people are engaged in trying to recruit folks to kill Americans and we can discredit them, we ought to," said Baker. "On the whole, it's fairer and maybe more humane" than bombing a target, he said, describing the tactic as "dropping the truth on them." Any system can be abused, Baker allowed, but he said fears of the policy drifting to domestic political opponents don't justify rejecting it. "On that ground you could question almost any tactic we use in a war, and at some point you have to say we're counting on our officials to know the difference," he said.
  • ...6 more annotations...
  • In addition to analyzing the content of their internet activities, the NSA also examined the targets' contact lists. The NSA accuses two of the targets of promoting al Qaeda propaganda, but states that surveillance of the three English-speakers’ communications revealed that they have "minimal terrorist contacts." In particular, “only seven (1 percent) of the contacts in the study of the three English-speaking radicalizers were characterized in SIGINT as affiliated with an extremist group or a Pakistani militant group. An earlier communications profile of [one of the targets] reveals that 3 of the 213 distinct individuals he was in contact with between 4 August and 2 November 2010 were known or suspected of being associated with terrorism," the document reads. The document contends that the three Arabic-speaking targets have more contacts with affiliates of extremist groups, but does not suggest they themselves are involved in any terror plots. Instead, the NSA believes the targeted individuals radicalize people through the expression of controversial ideas via YouTube, Facebook and other social media websites. Their audience, both English and Arabic speakers, "includes individuals who do not yet hold extremist views but who are susceptible to the extremist message,” the document states. The NSA says the speeches and writings of the six individuals resonate most in countries including the United Kingdom, Germany, Sweden, Kenya, Pakistan, India and Saudi Arabia.
  • The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act. The document adds, "Information herein is based largely on Sunni extremist communications." It further states that "the SIGINT information is from primary sources with direct access and is generally considered reliable." According to the document, the NSA believes that exploiting electronic surveillance to publicly reveal online sexual activities can make it harder for these “radicalizers” to maintain their credibility. "Focusing on access reveals potential vulnerabilities that could be even more effectively exploited when used in combination with vulnerabilities of character or credibility, or both, of the message in order to shape the perception of the messenger as well as that of his followers," the document argues. An attached appendix lists the "argument" each surveillance target has made that the NSA says constitutes radicalism, as well the personal "vulnerabilities" the agency believes would leave the targets "open to credibility challenges" if exposed.
  • One target's offending argument is that "Non-Muslims are a threat to Islam," and a vulnerability listed against him is "online promiscuity." Another target, a foreign citizen the NSA describes as a "respected academic," holds the offending view that "offensive jihad is justified," and his vulnerabilities are listed as "online promiscuity" and "publishes articles without checking facts." A third targeted radical is described as a "well-known media celebrity" based in the Middle East who argues that "the U.S perpetrated the 9/11 attack." Under vulnerabilities, he is said to lead "a glamorous lifestyle." A fourth target, who argues that "the U.S. brought the 9/11 attacks on itself" is said to be vulnerable to accusations of “deceitful use of funds." The document expresses the hope that revealing damaging information about the individuals could undermine their perceived "devotion to the jihadist cause." The Huffington Post is withholding the names and locations of the six targeted individuals; the allegations made by the NSA about their online activities in this document cannot be verified. The document does not indicate whether the NSA carried out its plan to discredit these six individuals, either by communicating with them privately about the acquired information or leaking it publicly. There is also no discussion in the document of any legal or ethical constraints on exploiting electronic surveillance in this manner.
  • While Baker and others support using surveillance to tarnish the reputation of people the NSA considers "radicalizers," U.S. officials have in the past used similar tactics against civil rights leaders, labor movement activists and others. Under J. Edgar Hoover, the FBI harassed activists and compiled secret files on political leaders, most notably Martin Luther King, Jr. The extent of the FBI's surveillance of political figures is still being revealed to this day, as the bureau releases the long dossiers it compiled on certain people in response to Freedom of Information Act requests following their deaths. The information collected by the FBI often centered on sex -- homosexuality was an ongoing obsession on Hoover's watch -- and information about extramarital affairs was reportedly used to blackmail politicians into fulfilling the bureau's needs. Current FBI Director James Comey recently ordered new FBI agents to visit the Martin Luther King, Jr. Memorial in Washington to understand "the dangers in becoming untethered to oversight and accountability."
  • James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals. "The NSA's operation is eerily similar to the FBI's operations under J. Edgar Hoover in the 1960s where the bureau used wiretapping to discover vulnerabilities, such as sexual activity, to 'neutralize' their targets," he said. "Back then, the idea was developed by the longest serving FBI chief in U.S. history, today it was suggested by the longest serving NSA chief in U.S. history." That controversy, Bamford said, also involved the NSA. "And back then, the NSA was also used to do the eavesdropping on King and others through its Operation Minaret. A later review declared the NSA’s program 'disreputable if not outright illegal,'" he said. Baker said that until there is evidence the tactic is being abused, the NSA should be trusted to use its discretion. "The abuses that involved Martin Luther King occurred before Edward Snowden was born," he said. "I think we can describe them as historical rather than current scandals. Before I say, 'Yeah, we've gotta worry about that,' I'd like to see evidence of that happening, or is even contemplated today, and I don't see it."
  • Jaffer, however, warned that the lessons of history ought to compel serious concern that a "president will ask the NSA to use the fruits of surveillance to discredit a political opponent, journalist or human rights activist." "The NSA has used its power that way in the past and it would be naïve to think it couldn't use its power that way in the future," he said.
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
  •  
    By Glenn Greenwald, Ryan Gallagher, and Ryan Grim, 26 November 2013. I will annotate later. But this is by far the most important NSA disclosure from Edward Snowden's leaked documents thus far. A report originated by Gen. Alexander himself revealing COINTELPRO like activities aimed at destroying the reputations of non-terrorist "radicalizers," including one "U.S. person." This is exactly the kind of repressive activity that the civil libertarians among us warn about. 
4More

Officials Say U.S. May Never Know Extent of Snowden's Leaks - NYTimes.com - 0 views

  • American intelligence and law enforcement investigators have concluded that they may never know the entirety of what the former National Security Agency contractor Edward J. Snowden extracted from classified government computers before leaving the United States, according to senior government officials.
  • “They’ve spent hundreds and hundreds of man-hours trying to reconstruct everything he has gotten, and they still don’t know all of what he took,” a senior administration official said. “I know that seems crazy, but everything with this is crazy.” That Mr. Snowden was so expertly able to exploit blind spots in the systems of America’s most secretive spy agency illustrates how far computer security still lagged years after President Obama ordered standards tightened after the WikiLeaks revelations of 2010.
  • In recent days, a senior N.S.A. official has told reporters that he believed Mr. Snowden still had access to documents not yet disclosed. The official, Rick Ledgett, who is heading the security agency’s task force examining Mr. Snowden’s leak, said he would consider recommending amnesty for Mr. Snowden in exchange for those documents. “So, my personal view is, yes, it’s worth having a conversation about,” Mr. Ledgett told CBS News. “I would need assurances that the remainder of the data could be secured, and my bar for those assurances would be very high. It would be more than just an assertion on his part.”
  • ...1 more annotation...
  • Because the N.S.A. is still uncertain about exactly what Mr. Snowden took, government officials sometimes first learn about specific documents from reporters preparing their articles for publication — leaving the State Department with little time to notify foreign leaders about coming disclosures.
12More

NSA Whistleblower: Snowden Never Had Access to the "Juiciest" Intelligence Documents | ... - 0 views

  • NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping. Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:
  • He says the NSA started spying on President Obama when he was a candidate for Senate:
  • Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this. Washington’s Blog called Tice to find out more about what he saw when he was at NSA.
  • ...8 more annotations...
  • NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.] Does Snowden even have documents which contain the information which you’ve seen? RUSSELL TICE:  The answer is no. WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?
  • RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden? Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing? They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.] Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” - Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way. I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.
  • Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS. And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance]. ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks. These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]
  • It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency. When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up. There was no such thing beforehand. It was made up … to try to placate the American people. The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of. So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.
  • Snowden’s Failure To Understand the Most Important Documents RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG. The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at. But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there. I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.
  • Cheney Was Running the Show WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive]. Is that right … and if so, how do you know that? RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington. WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means? RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.
  • NSA Is Spying On CONTENT as Well as Metadata WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata? RUSSELL TICE: Of course it is. Of course. [Background. But see this.] NSA Spying On Journalists, Congress, Admirals, Lawyers … RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such. I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state. Or an Admiral and his wife, and his kids and his staffers …
  • The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else. These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.
  •  
    Whistleblower Russell Tice says that there are super-classified domestic surveillance records that Edward Snowden, Congressional oversight committees, and the NSA Inspector-General did not have access to. Must-read.
6More

M of A - Obama and Putin Agreed To Screw Erdogan? - 0 views

  • It's official! The New York Times finally admits that the "CIA rebels" in Syria who received tons of TOW anti-tank missiles are working under the field command of al-Qaeda/Jabhat al Nusra: Rebel commanders scoffed when asked about reports of the delivery of 500 TOWs from Saudi Arabia, saying it was an insignificant number compared with what is available. Saudi Arabia in 2013 ordered more than 13,000 of them. Given that American weapons contracts require disclosure of the “end user,” insurgents said they were being delivered with Washington’s approval. But, be assured, because these "CIA rebels" feel bad about it, they are still "moderate" or somewhat "relative moderate". Advancing alongside the Islamist groups, and sometimes aiding them, have been several of the relatively secular groups, like the Free Syrian Army, which have gained new prominence and status because of their access to the TOWs. ... It is a tactical alliance that Free Syrian Army commanders describe as an uncomfortable marriage of necessity, because they cannot operate without the consent of the larger and stronger Nusra Front. But Mr. Assad and his allies cite the arrangement as proof that there is little difference between insurgent groups, calling them all terrorists that are legitimate targets.
  • That these "relative secular" al-Qaeda auxiliaries are threatening suicide attacks against Russians only confirms their secularism. Judging from the reader comments to that NYT piece the U.S. people are pretty aghast about this now openly admitted cooperation. They, and a realist op-ed in the NYT, call for cooperation with Russia and the Syrian government. There may already be more cooperation between Russia and the U.S. than we can see. At least that is what the Turkish President Erdogan perceives. Yesterday the U.S. dropped 50 tons of small weapons and munition to Kurdish fighters in north east Syria. According the U.S. justification for this those Kurds along with some Arab Syrian tribals are supposed to attack the Islamic State in Raqqa. (Those Arab tribals are by the way just a bunch of worthless thieves. This according to the Voice of America(!).) But the Kurds do not seem to know about those Raqqa plans anyway. They have different aims:
  • U.S. officials hope the YPG will now turn its attention to Raqqa, the Syrian city that is the defacto capital of the Islamic State, which lies just 60 miles south of Tal Abyad, a border town the YPG seized from the Islamic State in June, with U.S. help. But PYD spokesman Can said the Kurdish group’s first priority is to link the Kurdish enclave of Afrin, northwest of the Syrian city of Aleppo, with Kobani, the Kurdish enclave northeast of Aleppo. That would mean clearing the Islamic State from villages along 60 miles of the Turkey-Syria border, in particular the border town of Jarablus. “Our prime and most important goal is to liberate Jarablus and to connect Kobani with Afrin,” Can told McClatchy. Capturing Raqqa, a mostly Arab city, is “not really” a PYD objective, he said. “Not for now,” he said. That is just as I suspected the Kurds to react. But why did the U.S. officials claim that these Kurds and the collection of thieves would attack Raqqa? Did they not coordinate with them or was that Raqqa story a ruse? The Turks seem to assume such and they accuse the U.S. as well as Russia of coordinating with the Kurds to seal the border with Turkey: Turkey warns U.S., Russia against backing Kurdish militia in Syria
  • ...2 more annotations...
  • Turkey has warned the United States and Russia it will not tolerate Kurdish territorial gains by Kurdish militia close to its frontiers in north-western Syria, two senior officials said. "This is clear cut for us and there is no joking about it," one official said of the possibility of Syrian Kurdish militia crossing the Euphrates to extend control along Turkish borders from Iraq's Kurdistan region towards the Mediterranean coast. ... "The PYD has been getting closer with both the United States and Russia of late. We view the PYD as a terrorist group and we want all countries to consider the consequences of their cooperation," one of the Turkish officials said. Turkey suspects Russia, which launched air strikes in Syria two weeks ago, has also been lending support to the YPG and PYD. "With support from Russia, the PYD is trying to capture land between Jarablus and Azaz, going west of the Euphrates. We will never accept this," the official said.
  • Is there now really coordination between Russia and the U.S. to seal the Syrian-Turkish border witch would cut off the Islamic State but also the al-Qaeda "CIA rebels" from their supplies? This would destroy all Turkish plans for Syria: a "safe zone" in Syria under Turkman control, a Sunni ruled pipeline corridor from Qatar to Europe, the Turkish-Ottoman annexation of Aleppo. Turkey would be pushed back into a secondary role. Do Russia and the U.S. now really make common cause and decided to screw Erdogan? This would make sense if the destruction of the Islamic State and all other terrorists in Syria is the common aim. That would be a change in the Obama administration's policy. Up to now it only helped the "salafist principality" to grow and never seriously attacked it. And if there is such cooperation why does the U.S still deliver thousands of TOWs to al-Qaeda which only kill more Syrians and prolong the fighting?
  •  
    Cutting off the ISIL and al-Nusrah supply lines from Turkey would indeed create problems for Turkish (and U.S. neocon) plans. 
« First ‹ Previous 61 - 80 of 1876 Next › Last »
Showing 20 items per page